共 22 条
[11]
Okamura K., Oyama Y., Load-based covert channels between Xen virtual machines, Proceedings of the 2010 ACM Symposium on Applied Computing, (2010)
[12]
Vieira K., Schulter A., Westphall B.C., Intrusion detection for grid and cloud computing, It Professional, 12, pp. 38-43, (2010)
[13]
Bijani S., Robertson D., Aspinall D., Probing attacks on multi-agent systems using electronic institutions, Declarative Agent Languages and Technologies IX, pp. 35-50, (2012)
[14]
Bhadauria R.R., Chaki R., Chaki N., A survey on security issues in cloud computing, 5388, (2011)
[15]
Subashini S.S., Kavitha V., A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, 34, pp. 1-11, (2011)
[16]
Gupta S., Kumar P., Abraham A., A Profile Based Network Intrusion Detection and Prevention System for Securing Cloud Environment, International Journal of Distributed Sensor Networks, (2013)
[17]
Lonea A.M., Popescu D.E., Tianfield H., Detecting DDoS Attacks in Cloud Computing Environment, International Journal of Computers Communications, 8, pp. 70-78, (2013)
[18]
Chonka A., Xiang Y., Zhou W.L., Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks, Journal of Network and Computer Applications, 34, pp. 1097-1107, (2011)
[19]
Lombardi F., Pietro R.D., Secure virtualization for cloud computing, Journal of Network and Computer Applications, 34, pp. 1113-1122, (2011)
[20]
Lee J., Park M., Eom J., Multi-level intrusion detection system and log management in cloud computing, (2011)